Описание
The default configuration of OpenSSH through 6.1 enforces a fixed time limit between establishing a TCP connection and completing a login, which makes it easier for remote attackers to cause a denial of service (connection-slot exhaustion) by periodically making many new TCP connections.
| Релиз | Статус | Примечание | 
|---|---|---|
| devel | not-affected  | 1:6.1p1-3 | 
| esm-infra-legacy/trusty | not-affected  | 1:6.1p1-3 | 
| esm-infra/xenial | not-affected  | 1:6.1p1-3 | 
| hardy | ignored  | end of life | 
| lucid | ignored  | end of life | 
| oneiric | ignored  | end of life | 
| precise | ignored  | |
| quantal | ignored  | end of life | 
| raring | not-affected  | 1:6.1p1-3 | 
| saucy | not-affected  | 1:6.1p1-3 | 
Показывать по
EPSS
5 Medium
CVSS2
Связанные уязвимости
The default configuration of OpenSSH through 6.1 enforces a fixed time limit between establishing a TCP connection and completing a login, which makes it easier for remote attackers to cause a denial of service (connection-slot exhaustion) by periodically making many new TCP connections.
The default configuration of OpenSSH through 6.1 enforces a fixed time limit between establishing a TCP connection and completing a login, which makes it easier for remote attackers to cause a denial of service (connection-slot exhaustion) by periodically making many new TCP connections.
The default configuration of OpenSSH through 6.1 enforces a fixed time ...
The default configuration of OpenSSH through 6.1 enforces a fixed time limit between establishing a TCP connection and completing a login, which makes it easier for remote attackers to cause a denial of service (connection-slot exhaustion) by periodically making many new TCP connections.
EPSS
5 Medium
CVSS2